CN113570494B - Encryption digital watermark adding method, system, device and storage medium - Google Patents

Encryption digital watermark adding method, system, device and storage medium Download PDF

Info

Publication number
CN113570494B
CN113570494B CN202110856720.8A CN202110856720A CN113570494B CN 113570494 B CN113570494 B CN 113570494B CN 202110856720 A CN202110856720 A CN 202110856720A CN 113570494 B CN113570494 B CN 113570494B
Authority
CN
China
Prior art keywords
matrix
encrypted digital
digital watermark
characteristic
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110856720.8A
Other languages
Chinese (zh)
Other versions
CN113570494A (en
Inventor
安达
唐大闰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Minglue Artificial Intelligence Group Co Ltd
Original Assignee
Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Minglue Artificial Intelligence Group Co Ltd filed Critical Shanghai Minglue Artificial Intelligence Group Co Ltd
Priority to CN202110856720.8A priority Critical patent/CN113570494B/en
Publication of CN113570494A publication Critical patent/CN113570494A/en
Application granted granted Critical
Publication of CN113570494B publication Critical patent/CN113570494B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The application discloses an encryption digital watermark adding method, an encryption digital watermark adding system, computer equipment and a computer readable storage medium. The technical scheme of the method is applied to a multimedia carrier and comprises the following steps: singular value decomposition: outputting N first characteristic orthogonal matrixes which comprise N multiplied by N of characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are larger than or equal to one; calculating an encryption matrix: based on a character string containing digital watermark content, calculating a hash value of the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one; fusing the matrix: and replacing the ith item to the (i+M-1) th item in the characteristic orthogonal matrix with a hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one. The invention uses the encryption matrix as the characteristic information, and can restore the characteristic information even if part of the information is lost.

Description

Encryption digital watermark adding method, system, device and storage medium
Technical Field
The present invention relates to the field of digital watermarking technology, and in particular, to an encrypted digital watermarking method, an encrypted digital watermarking system, a computer device, and a computer readable storage medium.
Background
Watermarks are widely visible in everyday life as a means of copyright notice and protection. The traditional watermarks are mostly emerging watermarks, watermark information is directly overlapped on a carrier through a technical means, and the method has the characteristics of convenience in implementation, flexibility in embedding and the like.
However, the emerging watermark has poor concealment, and the watermark information is easily destroyed by simple operations such as clipping and shielding while affecting the visual sense of the picture. As an emerging technical scheme, the hidden watermark (also called digital watermark) can be used for embedding watermark information into multimedia carriers such as audio, image or video under the condition that human eyes (ears) can hardly perceive the watermark information, and has wide application prospects in copyright protection and tracing.
However, in the prior art, a picture is converted from a spatial domain to a frequency domain, and then the picture is converted to the spatial domain after the watermark is added to the frequency domain.
Fig. 1 is an original diagram of the prior art, fig. 2 is a diagram of a watermark in the prior art, fig. 3 is a diagram of a frequency domain diagram in the prior art, fig. 4 is a diagram of a watermarked frequency domain diagram in the prior art, and fig. 5 is a diagram of a frequency domain inverse conversion in the prior art; as shown in fig. 1 to 5, in the prior art, the watermark adding operation is based on basic rotation and translation, light and dark adjustment and the like, and the watermark is not greatly influenced, but the watermark is brushed off after a blurring algorithm is adopted, robustness of the method is poor, logo or two-dimensional code information is easily damaged and cannot be restored, and the method uses an encryption matrix method as characteristic information, so that the characteristic information can be restored even if part of information is lost.
Currently, aiming at the related technology, the following bottlenecks exist, and no effective solution has been proposed yet:
1. the watermark emerging in the prior art has poor concealment, and the watermark information is easily destroyed by simple operations such as clipping, shielding and the like while influencing the visual sense of the picture;
2. in the prior art, the watermark is added based on basic rotation translation, light and dark adjustment and other operations, so that the watermark is not greatly influenced, but the watermark is brushed off after a blurring algorithm is adopted;
3. in the prior art, the robustness is poor, and logo or two-dimensional code information is easily damaged and cannot be restored.
The invention provides a solution for solving the disappearance of digital watermarks after a fuzzy algorithm, and realizes a computer deep learning technology and a computer vision technology, and other patent application methods are to add two-dimensional codes or logo as watermarks into frequency domain information, but the robustness of the methods is poor, and the logo or two-dimensional code information is easily destroyed and cannot be restored.
Disclosure of Invention
The embodiment of the application provides an encryption digital watermark adding method, an encryption digital watermark adding system, computer equipment and a computer readable storage medium, so as to solve the problem that digital watermarks are easy to disappear in the related prior art.
In a first aspect, an embodiment of the present application provides an encrypted digital watermarking method, applied to a multimedia carrier, including the following steps:
singular value decomposition: outputting N first characteristic orthogonal matrixes which comprise N multiplied by N of characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are larger than or equal to one;
calculating an encryption matrix: based on a character string containing digital watermark content, calculating a hash value of the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one;
fusing the matrix: and replacing the ith item to the (i+M) th item in the characteristic orthogonal matrix with a hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one.
In some of these embodiments, the encrypted digital watermarking method further comprises:
and a multimedia restoring step: and calculating the second characteristic orthogonal matrix, and comparing and verifying the second characteristic orthogonal matrix with the original multimedia carrier after restoring the multimedia carrier.
In some of these embodiments, the encrypted digital watermarking method further comprises:
watermark reverse verification step: and executing a singular value decomposition step on the multimedia carrier with the encrypted digital watermark added, obtaining the ith item to the (i+M) th item of the first characteristic orthogonal matrix, and comparing the ith item to the (i+M) th item with the hash orthogonal matrix to finish the reverse verification of the encrypted digital watermark.
In some of these embodiments, the encrypted digital watermarking method further comprises:
watermark fuzzy verification step: when the multimedia carrier performs fuzzy processing and the obtained partial numerical value of the encrypted digital watermark changes, the original data of the encrypted digital watermark is judged based on a mode method, and the reverse verification of the encrypted digital watermark is completed.
In a second aspect, an embodiment of the present application provides an encrypted digital watermarking system, which is applied to a multimedia carrier by adopting the encrypted digital watermarking method as described above, and includes the following modules:
singular value decomposition module: outputting N first characteristic orthogonal matrixes which comprise N multiplied by N of characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are larger than or equal to one;
calculating an encryption matrix module: based on a character string containing digital watermark content, calculating a hash value of the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one;
and (3) a fusion matrix module: and replacing the ith item to the (i+M) th item in the characteristic orthogonal matrix with a hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one.
In some of these embodiments, the encrypted digital watermarking system further comprises:
and a multimedia restoration module: and calculating a second characteristic orthogonal matrix, and comparing and verifying the second characteristic orthogonal matrix with the original multimedia carrier after the multimedia carrier is restored.
In some of these embodiments, the encrypted digital watermarking system further comprises:
watermark reverse verification module: and executing a singular value decomposition step on the multimedia carrier with the encrypted digital watermark added, obtaining the ith item to the (i+M) th item of the first characteristic orthogonal matrix, and comparing the ith item to the (i+M) th item with the hash orthogonal matrix to finish the reverse verification of the encrypted digital watermark.
In some of these embodiments, the encrypted digital watermarking system further comprises:
watermark ambiguity verification module: when the multimedia carrier performs fuzzy processing and the obtained partial numerical value of the encrypted digital watermark changes, the original data of the encrypted digital watermark is judged based on a mode method, and the reverse verification of the encrypted digital watermark is completed.
In a third aspect, an embodiment of the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the encrypted digital watermark adding method according to the first aspect described above when executing the computer program.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the encrypted digital watermarking method as described in the first aspect above.
Compared with the related prior art, the encryption watermarking method mainly solves the problem that the digital watermark disappears after a fuzzy algorithm, in the method used by the prior art, two-dimensional codes or logo are added into frequency domain information as watermarks, but robustness of the method is poor, logo or two-dimensional code information is easily damaged and cannot be restored, and the encryption matrix method is used as characteristic information, so that the characteristic information can be restored even if part of information is lost.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the other features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a schematic illustration of the prior art;
FIG. 2 is a schematic diagram of a prior art watermark;
FIG. 3 is a schematic diagram of a prior art intermediate frequency diagram;
FIG. 4 is a diagram of the frequency domain representation of the prior art after watermarking;
FIG. 5 is a schematic diagram of the prior art after frequency conversion;
fig. 6 is a flow chart of a digital watermarking method according to an embodiment of the present application;
FIG. 7 is a schematic diagram of an original image according to an embodiment of the present invention;
fig. 8 is a schematic diagram of k=20 pictures according to an embodiment of the present invention;
fig. 9 is a schematic diagram of k=40 pictures according to an embodiment of the present invention;
fig. 10 is a schematic diagram of k=60 pictures according to an embodiment of the present invention;
fig. 11 is a schematic diagram of k=80 pictures according to an embodiment of the present invention;
fig. 12 is a schematic diagram of k=100 pictures according to an embodiment of the present invention;
FIG. 13 is a schematic diagram of an embodiment of the present invention;
FIG. 14 is a schematic diagram of adding digital watermarks according to an embodiment of the invention;
fig. 15 is a schematic diagram of a digital watermarking system according to the present invention;
fig. 16 is a schematic diagram of a hardware structure of a computer device according to an embodiment of the present application.
In the above figures:
10 singular value decomposition module, 20 calculation encryption matrix module and 30 fusion matrix module
81. A processor; 82. a memory; 83. a communication interface; 80. a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described and illustrated below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments provided herein, are intended to be within the scope of the present application.
It is apparent that the drawings in the following description are only some examples or embodiments of the present application, and it is possible for those of ordinary skill in the art to apply the present application to other similar situations according to these drawings without inventive effort. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the embodiments described herein can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar terms herein do not denote a limitation of quantity, but rather denote the singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in this application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein refers to two or more. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., "a and/or B" may mean: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
The method, the device, the equipment or the computer readable storage medium can be applied to multimedia carriers such as audio, images or videos, and has wide application prospects in copyright protection and tracing.
The embodiment provides an encryption digital watermark adding method. Fig. 6 is a flowchart of a digital watermarking method according to an embodiment of the present application, as shown in fig. 6, the flowchart including the steps of:
the embodiment of the application provides an encryption digital watermark adding method, which is applied to a multimedia carrier and comprises the following steps:
singular value decomposition step S10: outputting N first characteristic orthogonal matrixes which comprise N multiplied by N of characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are larger than or equal to one;
calculating an encryption matrix step S20: based on a character string containing digital watermark content, calculating a hash value of the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one;
fusion matrix step S30: and replacing the ith item to the (i+M) th item in the characteristic orthogonal matrix with a hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one.
Further, the method for adding the encrypted digital watermark further comprises the following steps:
and a multimedia restoring step: and calculating the second characteristic orthogonal matrix, and comparing and verifying the second characteristic orthogonal matrix with the original multimedia carrier after restoring the multimedia carrier.
Further, the method for adding the encrypted digital watermark further comprises the following steps:
watermark reverse verification step: and executing a singular value decomposition step on the multimedia carrier with the encrypted digital watermark added, obtaining the ith item to the (i+M) th item of the first characteristic orthogonal matrix, and comparing the ith item to the (i+M) th item with the hash orthogonal matrix to finish the reverse verification of the encrypted digital watermark.
Further, the method for adding the encrypted digital watermark further comprises the following steps:
watermark fuzzy verification step: when the multimedia carrier performs fuzzy processing and the obtained partial numerical value of the encrypted digital watermark changes, the original data of the encrypted digital watermark is judged based on a mode method, and the reverse verification of the encrypted digital watermark is completed.
The following describes in detail the process flow of a specific embodiment of the method according to the invention with reference to the accompanying drawings:
(1) Singular value decomposition
In the specific embodiment of the invention, singular value decomposition (svd) is performed on the image pixels, but the invention is not limited to the singular value decomposition, and other multimedia carriers such as audio, video and the like can be processed;
singular value decomposition principle: in linear algebra, we know that there is a singular value decomposition for any one matrix,
A=U∑V T where U and V are orthonormal matrices and are a diagonal matrix, each diagonal element being a singular value of the matrix, the singular value referring to the eigenvalue root of the matrix. The concrete decomposition form is as follows:
wherein the method comprises the steps of
Spreading a to a=σ 1 u 1 v T 12 u 2 v T 2 +…+σ r u r v T r
U is an m×n matrix satisfying U T U=I n ,I n Is an n x n unit array
V is an n×n matrix satisfying V T V=I n
D is an n diagonal matrix, all elements being non-negative
The delta weights from the upper left corner to the lower right corner decrease in sequence according to the singular value decomposition calculation. Looking a into a matrix of images, each component of the above sum formula is ordered by size, the larger the description the more important. While the latter weights are small and can be discarded without affecting the sharpness of the image.
Fig. 7 is a schematic diagram of an original picture according to an embodiment of the present invention, as shown in fig. 7, pixel data in the original picture can be regarded as a matrix, and an arbitrary matrix of the original picture is decomposed and calculated into N n×n orthogonal matrices by svd, in the embodiment of the present invention, if the first 100 items contain most of characteristic information of the original picture, the first 100 items can be used to describe main part characteristic information of the picture, and we calculate the first k=100 items to obtain recovered a k Fig. 8 is a schematic diagram of embodiment k=20, fig. 9 is a schematic diagram of embodiment k=40, fig. 10 is a schematic diagram of embodiment k=60, fig. 11 is a schematic diagram of embodiment k=80, fig. 12 is a schematic diagram of embodiment k=100, and as shown in fig. 9-12, the first k is calculated to obtain recovered a k
Computing an encryption matrix
1. Assuming that the watermark content is 'job number 888888', calculating the hash value of the character string;
hash ("work 8888888") = a80e432caf43d1f1928a33b61808903b;
3. converting the data into 10 system, and taking the first 10 bits as 2223384357;
4. the encryption matrix is as follows:
(3) Fusing encryption matrix into decomposition matrix
We will I 101 To I 110 Instead of being an encryption matrix, let k= [101,102 the.110]I of the 10 items k Instead of the above 10 matrices, fig. 13 is a schematic diagram of an embodiment of the present invention; fig. 14 is a schematic diagram of adding a digital watermark according to an embodiment of the present invention, and as shown in fig. 13 and 14, it can be seen that the difference between the picture and the original picture after adding the watermark is very small.
(4) Restoring pictures
We will I 101 To I 110 Replaced by an encryption matrix and then a new matrix a is calculated.
(5) Watermark verification computation
The picture is subjected to svd decomposition, and 101 to 110 items are taken, so that watermark information can be obtained as follows:
(6) Watermark ambiguity verification
If the image is subjected to blurring processing, the obtained watermark information is as follows:
although the partial value is changed, the original data can be judged according to the mode (if the picture is changed too severely, watermark information recovery may be wrong)
Fig. 15 is a schematic diagram of a digital watermarking system according to the present invention, as shown in fig. 15, an embodiment of the present application provides an encrypted digital watermarking system 100, which is applied to a multimedia carrier by adopting the encrypted digital watermarking method as described above, and includes the following modules: the singular value decomposition module 10 calculates an encryption matrix module 20 and a fusion matrix module 30;
singular value decomposition module 10: outputting N first characteristic orthogonal matrixes which comprise N multiplied by N of characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are larger than or equal to one;
the calculation encryption matrix module 20: based on a character string containing digital watermark content, calculating a hash value of the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one;
fusion matrix module 30: and replacing the ith item to the (i+M) th item in the characteristic orthogonal matrix with a hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one.
Further, the encrypted digital watermarking system further comprises:
and a multimedia restoration module: and calculating a second characteristic orthogonal matrix, and comparing and verifying the second characteristic orthogonal matrix with the original multimedia carrier after the multimedia carrier is restored.
Further, the encrypted digital watermarking system further comprises:
watermark reverse verification module: and executing a singular value decomposition step on the multimedia carrier with the encrypted digital watermark added, obtaining the ith item to the (i+M) th item of the first characteristic orthogonal matrix, and comparing the ith item to the (i+M) th item with the hash orthogonal matrix to finish the reverse verification of the encrypted digital watermark.
Further, the encrypted digital watermarking system further comprises:
watermark ambiguity verification module: when the multimedia carrier performs fuzzy processing and the obtained partial numerical value of the encrypted digital watermark changes, the original data of the encrypted digital watermark is judged based on a mode method, and the reverse verification of the encrypted digital watermark is completed.
In a third aspect, an embodiment of the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the encrypted digital watermark adding method according to the first aspect described above when executing the computer program.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the encrypted digital watermarking method as described in the first aspect above.
In addition, the entity recommendation method of the embodiment of the present application described in connection with fig. 6 may be implemented by a computer device. Fig. 16 is a schematic diagram of a hardware structure of a computer device according to an embodiment of the present application.
The computer device may include a processor 81 and a memory 82 storing computer program instructions.
In particular, the processor 81 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, abbreviated as ASIC), or may be configured to implement one or more integrated circuits of embodiments of the present application.
Memory 82 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 82 may comprise a Hard Disk Drive (HDD), floppy Disk Drive, solid state Drive (Solid State Drive, SSD), flash memory, optical Disk, magneto-optical Disk, tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the foregoing. The memory 82 may include removable or non-removable (or fixed) media, where appropriate. The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In a particular embodiment, the Memory 82 includes Read-Only Memory (ROM) and random access Memory (Random Access Memory, RAM). Where appropriate, the ROM may be a mask-programmed ROM, a programmable ROM (Programmable Read-Only Memory, abbreviated PROM), an erasable PROM (Erasable Programmable Read-Only Memory, abbreviated EPROM), an electrically erasable PROM (Electrically Erasable Programmable Read-Only Memory, abbreviated EEPROM), an electrically rewritable ROM (Electrically Alterable Read-Only Memory, abbreviated EAROM), or a FLASH Memory (FLASH), or a combination of two or more of these. The RAM may be Static Random-Access Memory (SRAM) or dynamic Random-Access Memory (Dynamic Random Access Memory DRAM), where the DRAM may be a fast page mode dynamic Random-Access Memory (Fast Page Mode Dynamic Random Access Memory FPMDRAM), extended data output dynamic Random-Access Memory (Extended Date Out Dynamic Random Access Memory EDODRAM), synchronous dynamic Random-Access Memory (Synchronous Dynamic Random-Access Memory SDRAM), or the like, as appropriate.
Memory 82 may be used to store or cache various data files that need to be processed and/or communicated, as well as possible computer program instructions for execution by processor 81.
The processor 81 implements any of the entity recommendation methods of the above embodiments by reading and executing computer program instructions stored in the memory 82.
In some of these embodiments, the computer device may also include a communication interface 83 and a bus 80. As shown in fig. 16, the processor 81, the memory 82, and the communication interface 83 are connected to each other via the bus 80 and perform communication with each other.
The communication interface 83 is used to implement communications between various modules, devices, units, and/or units in embodiments of the present application. Communication port 83 may also enable communication with other components such as: and the external equipment, the image/data acquisition equipment, the database, the external storage, the image/data processing workstation and the like are used for data communication.
Bus 80 includes hardware, software, or both, coupling components of the computer device to each other. Bus 80 includes, but is not limited to, at least one of: data Bus (Data Bus), address Bus (Address Bus), control Bus (Control Bus), expansion Bus (Expansion Bus), local Bus (Local Bus). By way of example, and not limitation, bus 80 may include a graphics acceleration interface (Accelerated Graphics Port), abbreviated AGP, or other graphics Bus, an enhanced industry standard architecture (Extended Industry Standard Architecture, abbreviated EISA) Bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an industry standard architecture (Industry Standard Architecture, ISA) Bus, a wireless bandwidth (InfiniBand) interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a micro channel architecture (Micro Channel Architecture, abbreviated MCa) Bus, a peripheral component interconnect (Peripheral Component Interconnect, abbreviated PCI) Bus, a PCI-Express (PCI-X) Bus, a serial advanced technology attachment (Serial Advanced Technology Attachment, abbreviated SATA) Bus, a video electronics standards association local (Video Electronics Standards Association Local Bus, abbreviated VLB) Bus, or other suitable Bus, or a combination of two or more of the foregoing. Bus 80 may include one or more buses, where appropriate. Although embodiments of the present application describe and illustrate a particular bus, the present application contemplates any suitable bus or interconnect.
The computer device can be based on the encryption matrix method as the characteristic information, and even if part of the information is lost, the characteristic information can be restored, so that the encryption digital watermark adding method described in connection with fig. 1 is realized.
The invention can recover watermark information after the original data is subjected to fuzzy processing, mainly solves the problem of digital watermark disappearance after a fuzzy algorithm, and other patent application methods are to add two-dimensional codes or logo as watermark into frequency domain information, but the robustness of the methods is poor, and the logo or two-dimensional code information is easy to destroy and can not be recovered.
In addition, in combination with the encryption digital watermarking method in the above embodiment, the embodiment of the application may be implemented by providing a computer readable storage medium. The computer readable storage medium has stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the encrypted digital watermarking methods of the above embodiments.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (6)

1. An encryption digital watermarking method is applied to a multimedia carrier and is characterized by comprising the following steps:
singular value decomposition: outputting N first characteristic orthogonal matrixes of N multiplied by N containing characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are greater than or equal to one;
calculating an encryption matrix: calculating a hash value of a character string containing digital watermark content based on the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one;
fusing the matrix: replacing the ith item to the (i+M-1) item in the first characteristic orthogonal matrix with the hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one;
and a multimedia restoring step: calculating the second characteristic orthogonal matrix, and comparing and verifying the second characteristic orthogonal matrix with the original multimedia carrier after restoring the multimedia carrier;
watermark fuzzy verification step: when the multimedia carrier carries out fuzzy processing and the obtained partial numerical value of the encrypted digital watermark changes, the original data judgment of the encrypted digital watermark is carried out based on a mode method, and the reverse verification of the encrypted digital watermark is completed.
2. The encrypted digital watermarking method according to claim 1, further comprising:
watermark reverse verification step: and executing the singular value decomposition step on the multimedia carrier with the encrypted digital watermark added, obtaining the ith item to the (i+M-1) th item of the first characteristic orthogonal matrix, and comparing the ith item to the (i+M-1) th item with the hash orthogonal matrix to finish the reverse verification of the encrypted digital watermark.
3. An encrypted digital watermarking system, applied to a multimedia carrier, employing an encrypted digital watermarking method according to any of claims 1-2, characterized by comprising the following modules:
singular value decomposition module: outputting N first characteristic orthogonal matrixes of N multiplied by N containing characteristic values of the multimedia carrier based on singular value decomposition of an arbitrary matrix formed by the multimedia carrier data, wherein N and N are positive integers which are greater than or equal to one;
calculating an encryption matrix module: calculating a hash value of a character string containing digital watermark content based on the character string, carrying out binary conversion on the hash value, and converting the hash value into M n multiplied by n hash orthogonal matrices containing the hash value, wherein M is a positive integer greater than or equal to one;
and (3) a fusion matrix module: replacing the ith item to the (i+M-1) item in the first characteristic orthogonal matrix with the hash orthogonal matrix, outputting N N multiplied by N second characteristic orthogonal matrices, and finishing the addition of the encrypted digital watermark, wherein i is a positive integer greater than or equal to one;
and a multimedia restoration module: calculating the second characteristic orthogonal matrix, and comparing and verifying the second characteristic orthogonal matrix with the original multimedia carrier after restoring the multimedia carrier;
watermark ambiguity verification module: when the multimedia carrier carries out fuzzy processing and the obtained partial numerical value of the encrypted digital watermark changes, the original data judgment of the encrypted digital watermark is carried out based on a mode method, and the reverse verification of the encrypted digital watermark is completed.
4. An encrypted digital watermarking system according to claim 3, further comprising:
watermark reverse verification module: and executing the singular value decomposition step on the multimedia carrier with the encrypted digital watermark added, obtaining the ith item to the (i+M-1) th item of the first characteristic orthogonal matrix, and comparing the ith item to the (i+M-1) th item with the hash orthogonal matrix to finish the reverse verification of the encrypted digital watermark.
5. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the encrypted digital watermarking method according to any of claims 1 to 2 when executing the computer program.
6. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the encrypted digital watermarking method according to any of claims 1 to 2.
CN202110856720.8A 2021-07-28 2021-07-28 Encryption digital watermark adding method, system, device and storage medium Active CN113570494B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110856720.8A CN113570494B (en) 2021-07-28 2021-07-28 Encryption digital watermark adding method, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110856720.8A CN113570494B (en) 2021-07-28 2021-07-28 Encryption digital watermark adding method, system, device and storage medium

Publications (2)

Publication Number Publication Date
CN113570494A CN113570494A (en) 2021-10-29
CN113570494B true CN113570494B (en) 2024-01-26

Family

ID=78168383

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110856720.8A Active CN113570494B (en) 2021-07-28 2021-07-28 Encryption digital watermark adding method, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN113570494B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114461988A (en) * 2022-04-12 2022-05-10 恒生电子股份有限公司 Image encryption method and device, image decryption method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427231A (en) * 2015-11-26 2016-03-23 南京林业大学 SVD dual-layer digital watermarking method capable of avoiding false alarm

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009037778A1 (en) * 2007-09-21 2009-03-26 Shibaura Institute Of Technology Electronic watermark embedding device and method, and electronic watermark detecting device and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427231A (en) * 2015-11-26 2016-03-23 南京林业大学 SVD dual-layer digital watermarking method capable of avoiding false alarm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
代少升."基于奇异值分解与安全Hash函数的图像认证方法".《光电技术应用》.2010,第31卷(第02期),第303-307页. *

Also Published As

Publication number Publication date
CN113570494A (en) 2021-10-29

Similar Documents

Publication Publication Date Title
Peng et al. Adaptive reversible data hiding scheme based on integer transform
CN111768327B (en) Watermark adding and extracting method and device based on deep learning and storage medium
US8774451B2 (en) Method and apparatus for embedding a watermark image in a host image
Behnia et al. Watermarking based on discrete wavelet transform and q-deformed chaotic map
CN113570494B (en) Encryption digital watermark adding method, system, device and storage medium
Bhautmage et al. Advanced video steganography algorithm
Agilandeeswari et al. RST invariant robust video watermarking algorithm using quaternion curvelet transform
CN113592698B (en) Sixteen-element moment-based multi-view color image zero watermark processing method and system
Qiu et al. Reversible watermarking algorithm of vector maps based on ECC
US7970165B2 (en) System and method for watermarking data
CN109859090A (en) Reversible water mark method and device based on human visual system
US20120106780A1 (en) Two dimensional information symbol
Zhang et al. Self-recovery reversible image watermarking algorithm
Tsai An efficient 3D information hiding algorithm based on sampling concepts
Wang An efficient multiple-bit reversible data hiding scheme without shifting
Wahed et al. A simplified parabolic interpolation based reversible data hiding scheme
CN114092302A (en) Medical image robust watermarking method based on residual error network and depth separable convolution
CN115526282A (en) Watermark encryption method, watermark extraction method, device and storage medium
US7295678B2 (en) Method for inserting binary messages in a digital image
Abdallah et al. An efficient SVD image steganographic approach
Lee et al. Optimal pixel-level self-repairing authentication method for grayscale images under a minimax criterion of distortion reduction
US10078877B2 (en) Method and system for efficiently embedding a watermark in a digital image for mobile applications
Wahed et al. Efficient data embedding for interpolation based reversible data hiding scheme
Molina-Garcia et al. Parallel image and video self-recovery scheme with high recovery capability
Ogawa et al. Adaptive subspace-based inverse projections via division into multiple sub-problems for missing image data restoration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant